Which of the following is the MOST likely cause of the issue?

A financial analyst is expecting an email containing sensitive information from a client. When the email arrives, the analyst receives an error and is unable to open the encrypted message. Which of the following is the MOST likely cause of the issue?A . The S/MME plug-in is not enabled.B ....

August 22, 2021 No Comments READ MORE +

Which of the following would work BEST to help identify potential vulnerabilities?

An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?A . hping3 -S corsptia.org -p 80B . nc ―1 ―v comptia.org -p 80C . nmap comptia.org -p 80 ―sVD...

August 22, 2021 No Comments READ MORE +

Which of the following frameworks should the management team follow?

A multinational organization that offers web-based services has datacenters that are located only in the United States; however, a large number of its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management...

August 22, 2021 1 Comment READ MORE +

Which of the following would be the BEST to use?

A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?A . IDS solutionB . EDR solutionC . HIPS software solutionD . Network DLP solutionView AnswerAnswer: D

August 22, 2021 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

August 21, 2021 No Comments READ MORE +

Which of the following is the MOST likely attack type?

A security analyst is reviewing a penetration-testing report from a third-party contractor. The penetration testers used the organization's new API to bypass a driver to perform privilege escalation on the organization's web servers. Upon looking at the API, the security analyst realizes the particular API call was to a legacy...

August 21, 2021 No Comments READ MORE +

Which of the following scan types would produce the BEST vulnerability scan report?

A security analyst needs to perform periodic vulnerably scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?A . PortB . IntrusiveC . Host discoveryD . CredentialedView AnswerAnswer: D

August 21, 2021 No Comments READ MORE +

Which of the following services would BEST meet the criteria?

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?A . TLSB . PFSC . ESPD . AHView AnswerAnswer: A

August 21, 2021 1 Comment READ MORE +

Which erf the following attacks in happening on the corporate network?

A security administrator is analyzing the corporate wireless network The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...

August 21, 2021 No Comments READ MORE +

Which of the following are the BEST options to accomplish this objective'?

An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select...

August 21, 2021 No Comments READ MORE +